This is a common mistake people make when they receive attachments. The attachment exists as a part of the e-mail. When you launch the document from e-mail (Are you using Lotus Notes by ant chance?) it opens normally in the application, let's say Word or Excel, but it is based on a temp file created during the launch. When you make changes and hit Save, where are you saving to? Back to the temp file that is erased as soon as you close the application!

This causes problems for a lot of people (happens all the time) and you may be wondering, "Why don't 'they' fix this?"

Well, what would happen if I could edit e-mail that you sent to me? I could change what you wrote to anything I wanted. So if you rejected my request for vacation, raises, etc. I could change that to a yes answer and use "your" e-mail as proof.

This is a user training issue. You need to be aware that to edit a document, it must exist on your system, i.e. it must be saved to a local or network drive. If you still want to open documents directly from e-mail, that is fine. Just remember to use the Save As instead of the Save!

It is a little annoying that you copied my comment and called it an answer. In future, if you don't have anything to add, don't comment, and especially don't steal answers from other experts. Most people always post as Comments, that way it doesn't lock the question. The person who posted the question will award the points to whoever answered correctly.

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Featured Post

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

I was recently sitting at a desk at work with one of my colleagues and needed some information on my home computer. He watched as I turned on my home computer, established a remote session into it, got the information I needed and then shut it down …

If you're not part of the solution, you're part of the problem.
Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet. Use PRTG Network Monitor as one of the building blocks, to detect unusual…

Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually.
After setting up a router, find the network security…